CN112511483B - Data forwarding method, device and storage medium - Google Patents
Data forwarding method, device and storage medium Download PDFInfo
- Publication number
- CN112511483B CN112511483B CN202010135471.9A CN202010135471A CN112511483B CN 112511483 B CN112511483 B CN 112511483B CN 202010135471 A CN202010135471 A CN 202010135471A CN 112511483 B CN112511483 B CN 112511483B
- Authority
- CN
- China
- Prior art keywords
- communication node
- access control
- forwarding
- control message
- plane
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000004891 communication Methods 0.000 claims abstract description 85
- 238000004806 packaging method and process Methods 0.000 claims abstract description 7
- 230000005540 biological transmission Effects 0.000 claims description 45
- 238000004590 computer program Methods 0.000 claims description 5
- 238000005538 encapsulation Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000012546 transfer Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 241000465502 Tobacco latent virus Species 0.000 description 2
- 238000003491 array Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010327 methods by industry Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/741—Routing in networks with a plurality of addressing schemes, e.g. with both IPv4 and IPv6
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/33—Flow control; Congestion control using forward notification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2212/00—Encapsulation of packets
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application provides a data forwarding method, equipment and a storage medium. The method comprises the following steps: under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message; forwarding the first access control message to the second communication node according to a pre-arranged path.
Description
Technical Field
The present application relates to communications, and in particular, to a data forwarding method, apparatus, and storage medium.
Background
The wired broadband access is a basic access service of home broadband, enterprise private line, public WiFi and the like, is a second main stream broadband access service except mobile broadband, and along with the high-speed development of the emerging access service of IPTV, high-definition video and the like, the traditional mode of integrating a forwarding control surface (i.e. a forwarding surface and a control surface) of wired access network equipment is not suitable for the requirements of a cloud network architecture, the rapid development and delivery of new service and the like. Wired broadband access device transfer separation based on software defined networks (Software Defined Network, SDN)/network function virtualization (Network Functions Virtualization, NFV) has become an industry consensus, and commercial deployment is obtained in some domestic and international markets, and the international and domestic related standard organizations are also actively standardized to realize interconnection and interworking of an access device transfer plane and a control plane. The separate deployment of the control surfaces has a deployment mode in the same network domain and a mode of separate deployment across different network domains, namely a message transmission mechanism between the control surfaces is required to support the two deployment modes.
For transmission of access control messages between conversion control surfaces of a Broadband Remote access server (Broadband Remote ACCESS SERVER, BRAS) (or Broadband network gateway (Broadband Network Gateway, BNG)), the two-layer transmission scheme based on intra-domain routing, such as a virtual extensible local area network (Virtual Extensible LAN, vxLAN), can not realize transmission of access control messages and can not conduct intelligent flow guidance on access message data streams for scenes where the conversion control surfaces are separated and deployed in different network domains; the other type is a transmission scheme based on a GPRS tunnel protocol (GPRS Tunneling Protocol-U, GTP-U), and the intelligent guidance of the flow of the access control message data cannot be supported.
Disclosure of Invention
The embodiment of the application provides a data forwarding method, equipment and a storage medium, which can realize intelligent flow guidance of access control message data while supporting intra-domain and cross-domain message transmission.
The embodiment of the application provides a data forwarding method, which is applied to a first communication node and comprises the following steps:
Under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message;
forwarding the first access control message to a second communication node according to a pre-arranged path.
The embodiment of the application provides a data forwarding method, which is applied to a second communication node and comprises the following steps:
receiving a first access control message sent by a first communication node;
And analyzing the first access control message to obtain a corresponding original access control message and a meta-array of the first communication node.
The embodiment of the application provides equipment, which comprises the following components: a memory, and one or more processors;
the memory is used for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods of any of the embodiments described above.
An embodiment of the present application provides a storage medium storing a computer program that, when executed by a processor, implements the method of any of the embodiments described above.
Drawings
Fig. 1 is a flowchart of a data forwarding method according to an embodiment of the present application;
fig. 2 is a flowchart of another data forwarding method according to an embodiment of the present application;
Fig. 3 is a schematic diagram of a TLV encapsulation format according to an embodiment of the present application;
fig. 4 is a schematic diagram of a forwarding plane and a control plane cross-domain transmission access control board message according to an embodiment of the present application;
Fig. 5 is a schematic diagram of a forwarding plane and a transmission access control board message in a control plane according to an embodiment of the present application;
fig. 6 is a block diagram of a data forwarding device according to an embodiment of the present application;
Fig. 7 is a block diagram of another data forwarding device according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described below with reference to the accompanying drawings.
The forwarding plane and the control plane of the wired broadband access equipment are separated, so that the control plane is intensively deployed, namely, deployed at the cloud end and is responsible for users and policy management thereof; the distributed deployment of the forwarding plane, namely, the distributed deployment of the forwarding plane is close to a user, and the uplink and downlink forwarding of the user traffic is processed by special forwarding hardware, so that the function division and the independent deployment of the control plane of the forwarding plane bring about the improvement of the operation efficiency and the benefit, and simultaneously, a brand new requirement is also provided for a message transmission scheme between the control plane and the forwarding plane.
The wired broadband access is generally divided into two stages of user access control and traffic forwarding, wherein the user access control flow includes user access request message interaction and authentication flow, such as point-to-point connection protocol (Point to Point Protocol over Ethernet, PPPoE)/Ethernet IP (IP over Ethernet, IPoE)/Layer 2 tunnel protocol (Layer 2 Tunneling Protocol, L2 TP), etc., initiated by a user access gateway, such as RG, accesses a forwarding plane (BRAS-UP) of a BRAS via AN access network device AN (e.g., DSLAM or OLT), and the BRAS-UP is responsible for performing access control interaction with a control plane (BRAS-CP) of the BRAS, the access control flow is completed, user authentication is successful, effective address allocation is obtained, and the user traffic forwarding flow is entered.
At present, the transmission of access control messages between BRAS (or BNG) transfer control surfaces in the industry is based on a two-layer transmission scheme of intra-domain routing, such as VxLAN, and the transmission of access control messages can not be realized and the intelligent guidance of the flow of access message data streams can not be performed for the scenes of the transfer control surfaces which are separately deployed in different network domains; the other type is a transmission scheme based on GTP-U protocol, and cannot support intelligent guidance of the flow of access control message data.
In view of this, the embodiment of the present application provides a data forwarding method, which is based on the BRAS (or BNG) forwarding control plane access control message transmission of the 6 th edition (Segment Routingv, SRv) of source routing, and simultaneously supports intra-domain and inter-domain message transmission, and simultaneously achieves intelligent traffic guidance of access control message data, thereby providing a more flexible and intelligent vbas (or DBNG) traffic engineering solution for operators.
Fig. 1 is a flowchart of a data forwarding method according to an embodiment of the present application. The present embodiment is applied to a first communication node. Illustratively, the first communication node is a network access control node forwarding plane, e.g., the network access control node forwarding plane may be a BRAS forwarding plane node (i.e., a BRAS forwarding plane) or a BNG control plane. As shown in fig. 1, the present embodiment includes S110 to S120.
And S110, under the condition that a user access request is received, packaging the element array of the first communication node and the original access control message to obtain the first access control message.
In an embodiment, a user access request refers to a request for a user to conduct network communications. In an embodiment, the access gateway initiates access to the BRAS forwarding plane via the access network device, and the BRAS forwarding plane is responsible for performing access control interaction with the BRAS control plane. In the process of transmitting the access control message between the BRAS forwarding plane and the BRAS control plane, besides the original access control message, the BRAS forwarding plane also needs to package the forwarding plane hardware element array to which the original access control message belongs together to obtain a first access control message.
S120, forwarding the first access control message to the second communication node according to a preset path.
In an embodiment, the second communication node may be a BRAS control plane node (BRAS control plane). In an embodiment, transmission of the access control message is performed between the forwarding plane and the control plane based on the BRAS or BNG of SRv. SRv6 is a network forwarding protocol that supports both intra-domain and inter-domain packet transport. Meanwhile, when the first access control message is transmitted, the BRAS forwarding plane can arrange a transmission path to the BRAS control plane according to the business process engineering requirement so as to directly transmit the first access control message carrying the hardware element array to the second communication node, thereby realizing intelligent flow guidance of the access control message while supporting intra-domain and inter-domain message transmission.
In an embodiment, encapsulating the original access control message and the hardware element array to which the original access control message belongs includes: expanding a tuple of the first communication node in a destination option expansion header of internet protocol version 6 (Internet Protocol Version, ipv 6) according to a first preset manner; or expanding the tuple of the first communication node in a source route extension message Structure (SRH) of SRv in a first preset manner.
In an embodiment, the first preset manner includes: type-Length-Value (TLV) mode. In an embodiment, encapsulation of the BRAS or BNG forwarding plane hardware element arrays may be supported based on the extensions of IPv6 and SRv. In one embodiment, the hardware element array of the encapsulated forwarding plane is extended in the destination option extension header (Destination Options Header) of IPv6, i.e., the hardware element array of the forwarding plane is encapsulated in the data portion of the destination option extension header in the manner of an IPv6 extension header TLV. In an embodiment, the metadata of the forwarding plane (BRAS-UP or DBNG-UP) is extended in the encapsulation header SRH of SRv, i.e. the hardware element array of the forwarding plane is encapsulated by TLV in an optional extension part of the SRH.
In one embodiment, the hardware element array includes at least one of the following: port number, line card number, board card number, slot number, and rack number. In the embodiment, in the process of packaging the hardware element array, the sequence of each metadata is not limited, that is, the sequence of the port number, the line card number, the board card number, the slot number and the rack number is not limited.
In one embodiment, the destination option extension header is placed before the two-layer header. In an embodiment, in order to ensure that the intermediate routing node does not identify and process the hardware element array during the process of transmitting the first access control message from the first communication node to the second communication node, the destination option extension header encapsulated with the hardware element array may be placed before the two-layer header, but not before the SRH.
In one embodiment, forwarding the first access control message to the second communication node according to a pre-programmed path includes: arranging a transmission path to a second communication node according to the service flow demand to obtain a first preset transmission path; and forwarding the first access control message to the second communication node according to the first preset transmission path.
In one embodiment, the transmission path to the second communication node is arranged according to the traffic demand, comprising: a table of segment route identifications (SEGMENT IDENTIFIER, SID) encapsulating the SRH sets the second communication node as a path termination point. In an embodiment, path arrangement based on SRv is performed on the BRAS forwarding plane or the BNG forwarding plane to implement on-demand steering of the first access control packet data flow.
Fig. 2 is a flowchart of another data forwarding method according to an embodiment of the present application. The embodiment is applied to the second communication node. Illustratively, the second communication node is a network access control node control plane, for example, the network access control node control plane may be a BRAS control plane or a BNG control plane. As shown in fig. 2, the present embodiment includes: S210-S220.
S210, receiving a first access control message sent by a first communication node.
S220, analyzing the first access control message to obtain a corresponding original access control message and a meta-array of the first communication node.
In an embodiment, after the second communication node receives the first access control message, the hardware element array for identifying the forwarding plane is parsed from the destination option extension header or the SRH, and the two-layer access control message (i.e., the original access control message) is parsed, and the access control message forwarding flow is terminated.
In an implementation manner, the embodiment of the application provides a solution for transmitting access control messages of a BRAS (or BNG) transfer control plane based on SRv, which simultaneously supports intra-domain and cross-domain message transmission, and simultaneously realizes intelligent guidance of traffic of access control message data, thereby providing a more flexible and intelligent solution for vbas (or DBNG) traffic engineering for operators.
In an embodiment, in addition to transmission of an access control message between a forwarding plane (such as BRAS-UP or DBNG-UP) and a control plane (such as BRAS-CP or DBNG-CP) and an original access control message body (such as PPPoE, IPoE, L2TP, etc.), the forwarding plane needs to package and send a forwarding plane hardware element array (Meta data) (such as an interface, a port number, a line card number, a board card number, a slot number, etc.) to which the original access message belongs together to the control plane, so that the control plane can accurately correspond to the corresponding forwarding plane to perform subsequent control message interaction, and these metadata (which may also be referred to as element arrays) do not belong to the original access control message (two-layer protocol message), and an extension dedicated field needs to be extended for encapsulation.
In a first scheme, the metadata of the forwarding plane is extended in the destination option extension header of IPv6, that is, the metadata of the forwarding plane is encapsulated in the data portion of the destination extension header by using the manner of IPv6 extension header TLV, where each metadata has no specific order requirement between TLVs, and may include: a port number; a line card number; a board number; a slot number; frame number.
And forwarding the access control message transmission facing the control plane, wherein in order to ensure that each element array type is correctly identified, the upper two bits of an IPv6 or SRv type field are 10, and the CHG is 0, namely the element data cannot be changed at an intermediate node. The metadata is read and parsed, the application is only related to the control plane, i.e. the end point of the transfer transmission route, and the intermediate node does not need to process, so the destination option extension header must be placed before the two-layer header (for example, the two-layer access packet such as IPoE, PPPoE, L2TP, etc.), but cannot be placed before the SRH. In this way, a terminal network Function (Function) end. Bng-u is newly defined, the forwarding plane metadata and the access control message in the two layers are extracted, and the access control forwarding flow is terminated. The Type values are uniformly distributed and coordinated by IANA and the like, and can be distributed and coordinated by enterprises or alliances in the local application scene, so that the global characteristics of the Type values are ensured. Fig. 3 is a schematic diagram of a TLV encapsulation format according to an embodiment of the present application. As shown in fig. 3, the forwarding plane may encapsulate metadata in the order of type-length-value.
And in the case of intelligent guidance of the access control message data flow, path arrangement based on SRv is carried out on the forwarding surface, so that the on-demand guidance of the access control message data flow is realized.
Scheme II, metadata of a forwarding plane (BRAS-UP & DBNG-UP) is extended in an encapsulation header SRH of SRv, namely, the metadata of the forwarding plane is encapsulated in an optional extension part of the SRH in a TLV mode, and no specific order is required between the metadata TLVs, wherein the method comprises the following steps: a port number; a line card number; a board number; a slot number; frame number.
The routing node between the forwarding plane and the control plane does not need to recognize and process the above metadata, and only understands the encapsulation metadata at the control plane, i.e. the termination point. Therefore, a termination point network Function (Function) is newly defined to extract the forwarding plane metadata and the access control message in the two layers, and terminate the access control forwarding flow. The Type values are uniformly distributed and coordinated by IANA and the like, and can be distributed and coordinated by enterprises or alliances in the local application scene, so that the global characteristics of the Type values are ensured.
And carrying out SRv-based path arrangement on a forwarding surface, thereby realizing on-demand guidance of the data flow of the access control message.
In the embodiment, in the transmission of the access control message with the BRAS (or BNG) forwarding control separation of the fixed network, besides the transmission from the forwarding plane to the control plane, the transmission from the control plane to the forwarding plane is also unicast transmission (except for the 1+1 hot standby protection scenario), and likewise, the access control message is transmitted through SRv to realize flexible path arrangement, unlike the transmission from the forwarding plane to the control plane, in this scenario, encapsulation of metadata is not required.
In the embodiment, the forwarding plane node may be a physical node or a virtual node, and in both cases, the forwarding plane needs to encapsulate its own metadata to inform the control plane. In the case of a virtual forwarding plane, metadata includes, but is not limited to, a virtual port number, a virtual slot number, and the type may reuse the metadata definition corresponding to the physical forwarding plane.
In one implementation, the access control message is transmitted across domains based on the BRAS (or BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by an extension destination option extension header. Fig. 4 is a schematic diagram of a forwarding plane and a control plane cross-domain transmission access control board packet according to an embodiment of the present application.
As shown in fig. 4, a forwarding plane (UP) and a Control Plane (CP) belong to two different network domains, after a user access control message forwarded by an RG arrives at the UP, the UP composes a transmission path of a cross-domain control plane, i.e. a SID table of an encapsulation SRH, according to a traffic engineering requirement, and sets a control plane node as a path termination point, so as to guide the access control message traffic to be transmitted according to a specified path. Meanwhile, the metadata of the UP is packaged in a destination option extension header in a TLV format, the extension header is placed in front of a two-layer message header, the packaged SRv data message is forwarded in a cross-domain mode according to a path indicated by a SID table, and the intermediate routing node does not recognize and process the forwarding plane metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the destination option extension header, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In one implementation, the access control message is transmitted across domains based on the BRAS (BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by extending the SRH optional portion.
As shown in fig. 4, the forwarding plane and the control plane belong to two different network domains, after the user access control message forwarded by the RG reaches UP, the UP composes a transmission path of the cross-domain control plane according to the traffic flow engineering requirement, i.e. encapsulates the SID table of the SRH, and sets the control plane node as a path termination point, so as to guide the access control message flow to be transmitted according to the designated path. And at the same time, expanding the SRH optional part, encapsulating metadata, and encapsulating the metadata in a TLV format. And carrying out cross-domain forwarding on the packaged SRv data message according to a path indicated by the SID table, wherein the intermediate node does not recognize and process the forwarding surface metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the SRH, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In one implementation, the access control message is transmitted in-domain based on the BRAS (or BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by an extension destination option extension header. Fig. 5 is a schematic diagram of a forwarding plane and a transmission access control board message in a control plane according to an embodiment of the present application.
As shown in fig. 5, the forwarding plane UP and the control plane CP belong to the same network domain, after the user access control message forwarded by the RG arrives at the UP, the UP composes a transmission path to the control plane, i.e. an SID table of the encapsulation SRH, according to the traffic flow engineering requirement, and sets a control plane node as a path termination point, so as to guide the access control message flow to be transmitted according to a specified path. Meanwhile, the metadata of the UP is packaged in a destination option extension header, the extension header is placed in front of a two-layer message header, the packaged SRv data message is subjected to intra-domain forwarding according to a path indicated by the SID list, and the intermediate node does not recognize and process the forwarding surface metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the destination option extension header, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In one implementation, the access control message is transmitted across domains based on the BRAS (BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by extending the SRH optional portion.
As shown in fig. 5, the forwarding plane and the control plane belong to the same network domain, after the user access control message forwarded by the RG arrives at the UP, the UP composes a transmission path to the control plane according to the traffic engineering requirement, i.e. the SID table of the encapsulation SRH, and sets the control plane node as a path termination point, so as to guide the access control message traffic to be transmitted according to the specified path. And at the same time, expanding the SRH optional part, encapsulating metadata, and encapsulating the metadata in a TLV format. And carrying out intra-domain forwarding on the packaged SRv data message according to a path indicated by the SID table, wherein the intermediate node does not recognize and process the forwarding surface metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the SRH header, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In an embodiment, fig. 6 is a block diagram of a data forwarding device according to an embodiment of the present application. The present embodiment is applied to a first communication node. As shown in fig. 6, the present embodiment includes: encapsulation module 310 and forwarding module 320.
The encapsulation module 310 is configured to encapsulate the primitive array of the first communication node and the original access control message to obtain a first access control message when receiving the user access request;
the forwarding module 320 is configured to forward the first access control message to the second communication node according to a pre-programmed path.
The data forwarding device provided in this embodiment is configured to implement the data forwarding method applied to the first communication node in the embodiment shown in fig. 1, and the implementation principle and the technical effect of the data forwarding device provided in this embodiment are similar, and are not repeated here.
In one embodiment, encapsulating the tuple of the first communication node and the original access control message includes:
Expanding the element array of the first communication node in the destination option expansion header of the IPv6 according to a first preset mode; or alternatively
The array of elements of the first communication node is extended in the SRH of SRv in a first preset manner.
In one embodiment, the destination option extension header is placed before the two-layer header.
In an embodiment, the first preset manner includes: type-length-value TLV mode.
In one embodiment, the hardware element array includes at least one of the following: port number, line card number, board card number, slot number, and rack number.
In one embodiment, forwarding the first access control message to the second communication node according to a pre-programmed path includes:
Arranging a transmission path to a second communication node according to the service flow demand to obtain a first preset transmission path;
and forwarding the first access control message to the second communication node according to the first preset transmission path.
In one embodiment, the transmission path to the second communication node is arranged according to the traffic demand, comprising: and packaging the SID table of the SRH, and setting the second communication node as a path termination point.
In one embodiment, the first communication node is a broadband access server, BRAS, forwarding plane node, and the second communication node is a BRAS control plane node.
In an embodiment, fig. 7 is a block diagram of another data forwarding device according to an embodiment of the present application. The embodiment is applied to the second communication node. As shown in fig. 7, the present embodiment includes: the receiving module 410 and the parsing module 420.
A receiving module 410, configured to receive a first access control message sent by a first communication node;
the parsing module 420 is configured to parse the first access control message to obtain a corresponding primitive set of the first communication node and the primitive set of the original access control message.
The data forwarding device provided in this embodiment is configured to implement the data forwarding method applied to the second communication node in the embodiment shown in fig. 2, and the implementation principle and the technical effect of the data forwarding device provided in this embodiment are similar, and are not repeated here.
Fig. 8 is a schematic structural diagram of an apparatus according to an embodiment of the present application. As shown in fig. 8, the apparatus provided by the present application includes: a processor 510, a memory 520, and a communication module 530. The number of processors 510 in the device may be one or more, one processor 510 being illustrated in fig. 8. The amount of memory 520 in the device may be one or more, one memory 520 being illustrated in fig. 8. The processor 510, memory 520, and communication module 530 of the device may be connected by a bus or otherwise, for example in fig. 8. In this embodiment, the device is a first communication node.
The memory 520 serves as a computer readable storage medium, and may be configured to store a software program, a computer executable program, and modules, such as program instructions/modules (e.g., an encapsulation module and a forwarding module in a data forwarding device) corresponding to the apparatus according to any embodiment of the present application. Memory 520 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created according to the use of the device, etc. In addition, memory 520 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some examples, memory 520 may further include memory located remotely from processor 510, which may be connected to the device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
A communication module 530 arranged to make a communication connection between the first communication node and the second communication node for data communication and signal communication.
The device provided above may be configured to perform the data forwarding method applied to the first communication node provided in any of the foregoing embodiments, and have corresponding functions and effects.
In the case that the device is the second communication node, the above provided device may be configured to execute the data forwarding method applied to the second communication node provided in any of the above embodiments, and have corresponding functions and effects.
The embodiments of the present application also provide a storage medium containing computer executable instructions which, when executed by a computer processor, are adapted to perform a data forwarding method applied to a first communication node, the method comprising: under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message; forwarding the first access control message to the second communication node according to a pre-arranged path.
The embodiment of the present application also provides a storage medium containing computer executable instructions which, when executed by a computer processor, are adapted to perform a data forwarding method applied to a second communication node, the method comprising: receiving a first access control message sent by a first communication node; and analyzing the first access control message to obtain a corresponding primitive access control message and a primitive array of the first communication node.
It will be appreciated by those skilled in the art that the term user equipment encompasses any suitable type of wireless user equipment, such as mobile telephones, portable data processing devices, portable web browsers, or car-mounted mobile stations.
In general, the various embodiments of the application may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
Embodiments of the application may be implemented by a data processor of a mobile device executing computer program instructions, e.g. in a processor entity, either in hardware, or in a combination of software and hardware. The computer program instructions may be assembly instructions, instruction set architecture (Instruction Set Architecture, ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages.
The block diagrams of any of the logic flows in the figures of this application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions. The computer program may be stored on a memory. The Memory may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), optical storage devices and systems (digital versatile Disk (Digital Video Disc, DVD) or Compact Disk (CD)), and the like. The computer readable medium may include a non-transitory storage medium. The data processor may be of any type suitable to the local technical environment, such as, but not limited to, general purpose computers, special purpose computers, microprocessors, digital signal processors (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED Circuits (ASIC), programmable logic devices (Field-Programmable GATE ARRAY, FGPA), and processors based on a multi-core processor architecture.
Claims (8)
1. A data forwarding method, applied to a first communication node, comprising:
Under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message;
forwarding the first access control message to a second communication node according to a pre-arranged path;
the encapsulating the element array of the first communication node and the original access control message includes:
Expanding a tuple of the first communication node in an IPv 6-based source route expansion message structure SRH of a source route version 6 SRv according to a first preset mode;
the first communication node is a broadband access server (BRAS) forwarding plane node, and the second communication node is a BRAS control plane node.
2. The method of claim 1, wherein the first preset manner comprises: type-length-value TLV mode.
3. The method of claim 1, wherein the array of elements comprises at least one of: port number, line card number, board card number, slot number, and rack number.
4. The method of claim 1, wherein forwarding the first access control message to the second communication node according to the pre-programmed path comprises:
Arranging a transmission path to a second communication node according to the service flow demand to obtain a first preset transmission path;
forwarding the first access control message to a second communication node according to the first preset transmission path.
5. The method of claim 4, wherein the routing the transmission path to the second communication node according to traffic demand comprises: and encapsulating a segment route identification (SID) table of the SRH, and setting the second communication node as a path termination point.
6. A data forwarding method, applied to a second communication node, comprising:
receiving a first access control message sent by a first communication node;
analyzing the first access control message to obtain a corresponding primitive array of the original access control message and the first communication node;
the tuple is encapsulated by a first communication node, and specifically comprises:
Expanding a tuple of the first communication node in an IPv 6-based source route expansion message structure SRH of a source route version 6 SRv according to a first preset mode;
the first communication node is a broadband access server (BRAS) forwarding plane node, and the second communication node is a BRAS control plane node.
7. An apparatus, comprising: a memory, and one or more processors;
the memory is used for storing one or more programs;
When executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
8. A storage medium storing a computer program which, when executed by a processor, implements the method of any one of claims 1-6.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010135471.9A CN112511483B (en) | 2020-03-02 | 2020-03-02 | Data forwarding method, device and storage medium |
US17/909,071 US20230089240A1 (en) | 2020-03-02 | 2020-12-11 | Data forwarding method and apparatus, device, and storage medium |
PCT/CN2020/135560 WO2021174943A1 (en) | 2020-03-02 | 2020-12-11 | Data forwarding method and apparatus, and device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010135471.9A CN112511483B (en) | 2020-03-02 | 2020-03-02 | Data forwarding method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112511483A CN112511483A (en) | 2021-03-16 |
CN112511483B true CN112511483B (en) | 2024-11-05 |
Family
ID=74953261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010135471.9A Active CN112511483B (en) | 2020-03-02 | 2020-03-02 | Data forwarding method, device and storage medium |
Country Status (3)
Country | Link |
---|---|
US (1) | US20230089240A1 (en) |
CN (1) | CN112511483B (en) |
WO (1) | WO2021174943A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113810288B (en) * | 2021-09-17 | 2023-05-02 | 新华三信息安全技术有限公司 | Message backhaul method and device |
CN116346716A (en) * | 2021-12-24 | 2023-06-27 | 华为技术有限公司 | Message processing method and device and communication system |
WO2024000135A1 (en) * | 2022-06-28 | 2024-01-04 | 新华三技术有限公司 | Packet processing |
CN117372166B (en) * | 2023-10-26 | 2024-03-08 | 北京开科唯识技术股份有限公司 | Efficient tail-end distribution processing method, device and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150673A (en) * | 2017-06-16 | 2019-01-04 | 华为技术有限公司 | Message encapsulating method and device based on BRAS system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140269724A1 (en) * | 2013-03-04 | 2014-09-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method and devices for forwarding ip data packets in an access network |
CN111884933B (en) * | 2016-07-01 | 2021-07-09 | 华为技术有限公司 | Method, device and system for forwarding message in Service Function Chain (SFC) |
CN106411664B (en) * | 2016-09-14 | 2019-08-27 | 中国联合网络通信集团有限公司 | A kind of metropolitan area network system |
US10454822B2 (en) * | 2017-07-27 | 2019-10-22 | Cisco Technology, Inc. | Full-path validation in segment routing |
CN109561021B (en) * | 2017-09-25 | 2021-08-20 | 华为技术有限公司 | Message forwarding method and network equipment |
CN108616431B (en) * | 2018-04-20 | 2020-09-08 | 新华三技术有限公司 | Message processing method, device, equipment and machine readable storage medium |
CN110266592B (en) * | 2019-06-21 | 2021-07-30 | Ut斯达康通讯有限公司 | Communication method and device for SRV6 network and IP MPLS network |
-
2020
- 2020-03-02 CN CN202010135471.9A patent/CN112511483B/en active Active
- 2020-12-11 US US17/909,071 patent/US20230089240A1/en active Pending
- 2020-12-11 WO PCT/CN2020/135560 patent/WO2021174943A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150673A (en) * | 2017-06-16 | 2019-01-04 | 华为技术有限公司 | Message encapsulating method and device based on BRAS system |
Also Published As
Publication number | Publication date |
---|---|
WO2021174943A1 (en) | 2021-09-10 |
US20230089240A1 (en) | 2023-03-23 |
CN112511483A (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112511483B (en) | Data forwarding method, device and storage medium | |
US11765000B2 (en) | Method and system for virtual and physical network integration | |
CN110557316B (en) | Message transmission method, system, device and computer readable storage medium | |
WO2017054576A1 (en) | Unicast tunnel building method, apparatus and system | |
CN103391296A (en) | Controller, openflow switch and method and system of channel establishing | |
CN111193644A (en) | vBRAS service transmission method, device, terminal equipment and medium | |
CN109936492A (en) | A kind of methods, devices and systems by tunnel transmission message | |
EP3930283A1 (en) | Communication method, apparatus and system | |
WO2015100585A1 (en) | Fiber-to-the-distribution point device and communication method therefor | |
CN108306755B (en) | Method and system for establishing management channel | |
CN111327445A (en) | Message sampling method, decapsulation method, node, system and storage medium | |
US11489768B2 (en) | Method for creating inter-domain bidirectional tunnel, communication method and device, and storage medium | |
CN111277426B (en) | IOAM information processing method and device | |
US20230018346A1 (en) | Dial-up packet processing method, network element, system, and network device | |
CN109302504B (en) | Method for establishing control signaling channel in PTN, PTN network element and storage medium | |
CN116488958A (en) | Gateway processing method, virtual access gateway, virtual service gateway and related equipment | |
WO2021232920A1 (en) | Data transmission method, electronic device, and storage medium | |
EP2858415B1 (en) | Multi-link-based data transmission method and device | |
CN114006860B (en) | User access method, system and device | |
WO2023125774A1 (en) | Vxlan packet transmission method, network device, and system | |
EP4340303A1 (en) | Data forwarding method and apparatus, storage medium, and electronic apparatus | |
WO2022267875A1 (en) | Packet transmission method and related device | |
EP4287568A1 (en) | Information processing method, and device and storage medium | |
CN112543135B (en) | Apparatus, method and device for communication, and computer-readable storage medium | |
WO2019176683A1 (en) | Relay device and relay method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |